https://bugzilla.mindrot.org/show_bug.cgi?id=2143
Petr Cerny [:hrosik] <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #5 from Petr Cerny [:hrosik] <[email protected]> --- Created attachment 3044 --> https://bugzilla.mindrot.org/attachment.cgi?id=3044&action=edit generally skip throwing away opened sockets on EADDRNOTAVAIL I'm suppose the same could (in the future) happen for IPv4 (or other protocols), it might be better not to limit it to IPv6. Darren, do you have any concerns about this sort of limiting? AFAIU, the only way CVE-2008-1483 could creep back in is that someone enables disabled protocol and starts listening on the same port that is already used (with the address family that was available at the moment the connection was established). -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
